Created
October 6, 2021 06:02
-
-
Save jcnars/4b188b73b7020a8cc97d8f6c0be15fb8 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
✔ ~/learn_prow_local/test-infra [master ↓·167|✔] | |
20:21 $ minikube start | |
😄 minikube v1.23.2 on Debian rodete | |
✨ Automatically selected the docker driver | |
👍 Starting control plane node minikube in cluster minikube | |
🚜 Pulling base image ... | |
🔥 Creating docker container (CPUs=2, Memory=15900MB) ... | |
🐳 Preparing Kubernetes v1.22.2 on Docker 20.10.8 ... | |
▪ Generating certificates and keys ... | |
▪ Booting up control plane ... | |
▪ Configuring RBAC rules ... | |
🔎 Verifying Kubernetes components... | |
▪ Using image gcr.io/k8s-minikube/storage-provisioner:v5 | |
🌟 Enabled addons: storage-provisioner, default-storageclass | |
🏄 Done! kubectl is now configured to use "minikube" cluster and "default" namespace by default | |
✔ ~/learn_prow_local/test-infra [master ↓·167|✔] | |
20:22 $ !baz | |
bazel run //prow/cmd/tackle | |
INFO: Analyzed target //prow/cmd/tackle:tackle (1 packages loaded, 876 targets configured). | |
INFO: Found 1 target... | |
Target //prow/cmd/tackle:tackle up-to-date: | |
bazel-bin/prow/cmd/tackle/tackle_/tackle | |
INFO: Elapsed time: 1.237s, Critical Path: 0.42s | |
INFO: 0 processes. | |
INFO: Build completed successfully, 1 total action | |
INFO: Build completed successfully, 1 total action | |
Existing kubernetes contexts: | |
0: gke_bmaas-testing_us-central1-c_cluster-1 | |
1: gke_bmaas-testing_us-west1-a_prow-poc | |
* 2: minikube (current) | |
Choose context or [create new]: 2 | |
Applying admin role bindings (to create RBAC rules)... | |
W1001 20:22:41.044189 28132 helpers.go:569] --dry-run=true is deprecated (boolean value) and can be replaced with --dry-run=client. | |
clusterrolebinding.rbac.authorization.k8s.io/prow-admin created | |
Deploying prow... | |
Apply starter.yaml from [github upstream]: /usr/local/google/home/jcnarasimhan/learn_prow_local/starter-gcs-incrementally-modified.yaml | |
namespace/prow created | |
configmap/plugins created | |
secret/github-token created | |
secret/hmac-token created | |
configmap/config created | |
deployment.apps/hook created | |
service/hook created | |
deployment.apps/sinker created | |
deployment.apps/deck created | |
service/deck created | |
deployment.apps/horologium created | |
deployment.apps/tide created | |
service/tide created | |
ingress.networking.k8s.io/prow created | |
deployment.apps/statusreconciler created | |
namespace/test-pods created | |
serviceaccount/deck created | |
rolebinding.rbac.authorization.k8s.io/deck created | |
rolebinding.rbac.authorization.k8s.io/deck created | |
role.rbac.authorization.k8s.io/deck created | |
role.rbac.authorization.k8s.io/deck created | |
serviceaccount/horologium created | |
role.rbac.authorization.k8s.io/horologium created | |
rolebinding.rbac.authorization.k8s.io/horologium created | |
serviceaccount/sinker created | |
role.rbac.authorization.k8s.io/sinker created | |
role.rbac.authorization.k8s.io/sinker created | |
rolebinding.rbac.authorization.k8s.io/sinker created | |
rolebinding.rbac.authorization.k8s.io/sinker created | |
serviceaccount/hook created | |
role.rbac.authorization.k8s.io/hook created | |
rolebinding.rbac.authorization.k8s.io/hook created | |
serviceaccount/tide created | |
role.rbac.authorization.k8s.io/tide created | |
rolebinding.rbac.authorization.k8s.io/tide created | |
serviceaccount/statusreconciler created | |
role.rbac.authorization.k8s.io/statusreconciler created | |
rolebinding.rbac.authorization.k8s.io/statusreconciler created | |
persistentvolumeclaim/ghproxy created | |
deployment.apps/ghproxy created | |
service/ghproxy created | |
deployment.apps/prow-controller-manager created | |
serviceaccount/prow-controller-manager created | |
role.rbac.authorization.k8s.io/prow-controller-manager created | |
role.rbac.authorization.k8s.io/prow-controller-manager created | |
rolebinding.rbac.authorization.k8s.io/prow-controller-manager created | |
rolebinding.rbac.authorization.k8s.io/prow-controller-manager created | |
deployment.apps/crier created | |
serviceaccount/crier created | |
role.rbac.authorization.k8s.io/crier created | |
role.rbac.authorization.k8s.io/crier created | |
rolebinding.rbac.authorization.k8s.io/crier created | |
rolebinding.rbac.authorization.k8s.io/crier created | |
Checking github credentials... | |
Store your GitHub token in a file e.g. echo $TOKEN > /path/to/github/token | |
Input /path/to/github/token to upload into cluster: /usr/local/google/home/jcnarasimhan/learn_prow_local/github_token_jcnars_github_app | |
INFO[0015] User() client=github | |
Prow will act as jcnars on github | |
Applying github token into oauth-token secret...W1001 20:22:53.953286 28496 helpers.go:569] --dry-run=true is deprecated (boolean value) and can be replaced with --dry-run=client. | |
secret/oauth-token created | |
Ensuring hmac secret exists at hmac-token...INFO[0015] Creating new hmac-token secret with random data... | |
exists | |
Looking for prow's hook ingress URL... FATA[0016] Could not get ingresses for service: hook error="the server could not find the requested resource (get ingresses.extensions)" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment